计算机科学 ›› 2013, Vol. 40 ›› Issue (9): 147-151.

• 信息安全 • 上一篇    下一篇

多用户关键词合取密文搜索方案

伍琦,万常选   

  1. 江西财经大学信息管理学院 南昌330013;江西财经大学信息管理学院 南昌330013
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(61163053),江西省教育厅科学技术研究项目(GJJ11730)资助

Multi-user Conjunctive Keyword Search Scheme over Ciphertext

WU Qi and WAN Chang-xuan   

  • Online:2018-11-16 Published:2018-11-16

摘要: 随着云计算下数据外包的流行,可搜索加密的重要性日益凸显。针对Yang等提出的多用户关键词合取搜索方案中,用户必须给全所有关键词值这一局限,设计了一个改进方案。随后,详细分析了新方案的正确性、安全性及运行效率。分析表明,新方案在维持原方案安全性的基础上,实现了用户仅需提交部分关键词这一实用功能。新方案运行效率出色,在云计算“瘦客户机”应用背景下有一定的实践价值。最后附带给出了新方案的一个简易实现。

关键词: 云计算,可搜索加密,关键词合取搜索 中图法分类号TN918.1文献标识码A

Abstract: Searchable encryption becomes increasingly significant with the prevalence of data outsourcing in cloud computing.To overcome the flaw in Yang et al.’s scheme that users have to provide all keywords,an improved one was proposed in this paper.The correctness,security and performance of the proposed scheme were analyzed in detail.It shows that the new scheme maintains the security properties of Yang et al.’s scheme but allows users to provide part of keywords.The new scheme performs well in terms of computational complexity,and can be applied to cloud computing where “thin client” is demanded.At last,a simple implementation of the new scheme was given.

Key words: Cloud computing,Searchable encryption,Conjunctive keyword search

[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83
[2] 张逢喆,陈进,陈海波,等.云计算中的数据隐私性保护与自我销毁[J].计算机研究与发展,2011,48(7):1155-1167
[3] 李乔,郑啸.云计算研究现状综述[J].计算机科学,2011,38(4):32-37
[4] 杨健,汪海航,王剑,等.云计算安全问题研究综述[J].小型微型计算机系统,2012,33(3):472-479
[5] 伍琦,万常选,李国林.一个改进型云存储共享方案[J].计算机科学,2012,39(8):99-103
[6] Song D X,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]∥Proceedings of IEEE Symposium on Security and Privacy (S&P’00).2000:44-55
[7] Goh E J.Secure Indexes.http://crypto.stanford.edu/ eu-jin/papers/ secureindex/secureindex.pdf,2003
[8] Chang Y C,Mitzenmacher M.Privacy Preserving Keyword Sear-ches on Remote Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security(ACNS’05).LNCS 3531,2005:442-455
[9] Ballard L,Kamara S,Monrose F.Achieving Efficient Conjunc-tive Keyword Searches over Encrypted Data[C]∥Proceedings of International Conference on Information and Communications Security(ICICS’05).2005:414-426
[10] Golle P,Staddon J,Waters B.Secure Conjunctive KeywordSearch over Encrypted Data[C]∥Proceedings of Applied Cryptography and Network Security (ACNS’04).2004:31-45
[11] Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[C]∥Proceedings of ACM Conference on Computer and Communications Security (CCS’06).2006:79-88
[12] Yang Z Q,Zhong S,Wright R.Privacy-Preserving Queries onEncrypted Data[C]∥Proceedings of European Symposium on Research in Computer Security (ESORICS’06).LNCS 4189,2006:479-495
[13] Boneh D,Crescenzo G,Ostrovsky R,et al.Public key encryption with keyword search[C]∥Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’04).2004:506-522
[14] Abdalla M,Bellare M,Catalano D,et al.Searchable Encryption Revisited:Consistency Properties,Ration to Anonymous IBE,and Extensions[C]∥Proceedings of International Cryptology Conference (CRYPTO’05).LNCS 3621,2005:205-222
[15] Hwang Y H,Lee P J.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System[C]∥Proceedings of International Conference on Pairing-Based Cryptography(Pairing’07).LNCS 4575,2007:2-22
[16] Yang Y J,Bao F,Ding X H,et al.Multiuser private queries over encrypted databases[J].Journal of Applied Cryptography,2009,1(4):309-319
[17] Yang Y J,Lu H B,Weng J.Multi-user private keyword search for cloud computing[C]∥Proceedings of Third IEEE International Conference on Cloud Computing Technology and Science(CloudCom’11).2011:264-271
[18] DARPA Information Science and Technology Study Group.Privacy with security[R].Technical report.http://www.cs.berkeley.edu/-tygar/papers/ISAT-final- briefing.pdf,2002-12
[19] Boneh D,Lynn B,Shacham H.Short signatures from the Weil pairing[J].Journal of Cryptology,2004,17(4):297-319
[20] Zhu R,Yang G M,Wong D.An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices[C]∥Proceedings of Internet and Network Economics First International workshop (WINE’05).LNCS 3828,2005:500-509

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!